Hostname: page-component-cb9f654ff-h4f6x Total loading time: 0 Render date: 2025-08-30T13:54:24.265Z Has data issue: false hasContentIssue false

Computer Crime in a Borderless World

Published online by Cambridge University Press:  07 May 2025

Peter Grabosky*
Affiliation:
Australian Institute of Criminology

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'

Information

Type
Research Article
Copyright
Copyright © 2000 International Society for Criminology

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable

Footnotes

(*)

He has worked since 1983. He holds a Ph.D. in Political Science from Northwestern University. Dr Grabosky has written extensively criminal justice and public policy, and is President of the Australian and New Zealand Society of Criminology and Deputy Secretary General of the International Society of Criminology.

He has published a number of books and articles including (with Russell G. Smith) Crime in the Digital Age : Controlling Telecommunications and Cyberspace Illegality (1998) and is just completing a new book, Electronic Theft : Crimes of Acquisition in the Digital Age (with Russell Smith and Gillian Dempsey).

References

Press, Associated (1998) «First cyber terrorist action reported» Nando. Net. http://www.techserver.com/newsroom/ntn/info/050698/info9_25501_noframes.html (visited 4 January 2000).Google Scholar
BBC (1999) Nato under «cyber attack», http://www.flora.org/flora.mai-not/10498 (visited 4 January 1999).Google Scholar
University, Carnegie Mellon (1999) CERT® Advisory CA-99-04-Melissa-Macro-Virus 31 March 1999 http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html (visited 4 September 2000).Google Scholar
University, Carnegie Mellon (2000) CERT Advisory CA-2000-04 Love Letter Worm May 5, 2000 http://www.cert.org/advisories/CA-2000-04.html (visited 4 September 2000).Google Scholar
Cella, J. J. and Stark, J. R. 1997, «SEC Enforcement and the Internet: Meeting the Challenge of the Next Millennium», The Business Lawyer, Vol. 52, pp. 815–49.Google Scholar
Cohen, L.E. and Felson, M. (1979) «Social Change and Crime Rate Trends: A Routine Activity Approach», American Sociological Review, 44, 588608.CrossRefGoogle Scholar
Creed, A. (1999) Indonesian Govt Suspected In Irish ISP Hack Newsbytes February 21, 1999 http://www.ccurrents.com/newstoday/99/02/2l/news8.html visited 10 January 2000.Google Scholar
Denning, D. (1999) Information Warfare and Security. Boston: Addison Wesley.Google Scholar
Edwards, O. (1995) «Hackers from Hell» Forbes, 9 October: 182.Google Scholar
Froomkin, A. (1995) «Anonymity and its Enmities» Journal of Online Law, art. 4 http://warthog.cc.wm.edu/law/publications/jol/froomkin.html (visited 7 September 2000).Google Scholar
Gold, Steve (1999) «BT Starts Switchboard Anti-Hacking Investigation» Newsbytes Jan 11 http://www.infowar.com/(visited 23 December 1999).Google Scholar
Grant, A., David, F., and Grabosky, P. (1997) «Child Pornography in the Digital Age» Transnational Organized Crime, 3,4, 171188.Google Scholar
Hundley, R. and Anderson, R. (1995) «Emerging Challenge: Security and Safety in Cyberspace», IEEE Technology and Society Magazine, 14 (4): 1928.CrossRefGoogle Scholar
International Chamber of Commerce (2000) Cybercrime Unit (Visited 16 January 2000).Google Scholar
Lanham, D., Weinberg, M., Brown, K. E. and Ryan, G. (1987) Criminal Fraud. Sydney: Law Book Co. Ltd.Google Scholar
Littman, J. (1997) The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. Boston: Little Brown.Google Scholar
Markoff, J. (2000) «An Online Extortion Plot Results in Release of Credit Card Data» The New York Times Online, 10 January.Google Scholar
Meyer, M. and Underwood, A. (1994), «Crimes of the Net», Bulletin/Newsweek, November 15: 68–9.Google Scholar
Miller, Greg and Maharaj, Davan (1999) «N. Hollywood man charged in 1st cyber-stalking case» Los Angeles Times, 22/1/99. http://www.cs.csubak.edu/~donna/news/crime.html#stalking (visited 12 June 1999).CrossRefGoogle Scholar
Newman, Keith (1998) «Phone Call Scams Skim off Millions» New Zealand Herald 20/08/98 (Visited 23 December 1999).Google Scholar
Post, D. G. (1995), «Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace», Journal of ONLINE Law, art. 3.Google Scholar
Rathmell, A. (1997) Cyber-terrorism: The Shape of Future Conflict? Royal United Service Institute Journal (October), 4046. http://www.kcl.ac.uk/orgs/icsa/rusi.htm#who (visited 21 December 1999).CrossRefGoogle Scholar
Ryan, M. (1998) Knowledge Diplomacy: Global Competition and the Politics of Intellectual Property Washington: Brookings.Google Scholar
Schieck, M. (1995) «Combating Fraud in Cable and Telecommunications», IIC Communications Topics No. 13. London: International Institute of Communications.Google Scholar
Schwartau, Winn (1994) Information Warfare: Chaos on the Electronic Superhighway. New York: Thunder’s Mouth Press.Google Scholar
Spice, Linda, and Sink, Lisa (1999) «Criminal charges sought over posting of nude photos on Web», Milwaukee Journal Sentinel, 20/5/99 http://www.jsonline.com/news/metro/apr99/990520criminalchargessought.asp (visited 12 June 1999).Google Scholar
Stoll, Clifford. (1991) The Cuckoo’s Egg. London: Pan Books.Google Scholar
Tendler, S. and Nuttall, N. (1996), «Hackers Leave Red-Faced Yard with 1.29m Bill», The Australian, 6 August: 37.Google Scholar
Todd, B. (2000) Distributed Denial of Service Attacks http://www.open-sourcefirewall.com/ddos_whitepapercopy.html# Abstract (visited 4 September 2000).Google Scholar
United States, Information Infrastructure Task Force (1995) Intellectual Property and the National Information Infrastructure: Report of the Working Group on Intellectual Property Rights. (Bruce A. Lehman: Chair), Washington: US Patent and Trademark Office.Google Scholar
Venditto, G. 1996, «Safe Computing», Internet World, September: 4858.Google Scholar
Wahlert, G. (1996) «Implications for Law Enforcement of the Move to a Cashless Society», 22-28 in Graycar, A. and Grabosky, P.N. (eds.), Money Laundering. Canberra: Australian Institute of Criminology.Google Scholar